Unfortunately, the friendly-looking free Wi-Fi might hide an evil twin Wi-Fi attack.

But what is an evil twin, and how can it compromise your IT security?

Why Do Hackers Use Fake Wi-Fi Networks?

wifi-evil-twins

Public Wi-Fi is often a target forman-in-the-middle (MITM)attacks.

These are seemingly genuine wireless networks created to trick potential victims into giving away their personal information.

They can look and act as you would expect from a real web link.

Public Wi-Fi Online Banking Security

Image Credit: Bernard Hermant/Unsplash

This includes using the same or similar name (thinkStarbucks Wi-FiversusStarbucks Free Wi-Fi) and the same login screen.

This includes grabbing any usernames, passwords, and other personal information you enter.

In short, any data you upload or download while on the hacker’s Wi-Fi is visible to them.

Young Man Smiling on Computer Device

What Is a Rogue Access Point (AP)?

This rig will broadcast its own Wi-Fi that will appear to connect you to the genuine data pipe.

However, your connection will go via the hacker’s access point instead of the intended secure gear.

Graphic of a threat actor hooking a folder named personal data from a laptop

Image Credit: Net Vector/Shutterstock

Rogue Access Points are a massive security issue that threatens the security of all connected users.

A rogue AP is difficult to spot as a user.

What Is an Evil Twin Wi-Fi data pipe?

connection refusal error message in microsoft edge

It differs in that it’s not strictly connected to the business' Wi-Fi unknowingly.

This Wi-Fi signal will usually overpower the real internet simply by being physically closer to the user.

Again, a Denial of Service attack to knock out the original access point is common in this scenario.

Either way, potential victims will connect to the hacker’s signal rather than the genuine data pipe.

Oddly enough, the easiest evil twins to spot can be those that are password-protected.

Another telltale sign of an evil twin attack is veryslow web connection connections.

It could be a sign that the hacker is using mobile internet to connect you to the web.

Also, pay attention to the address bar of the websites you visit.

If your banking website shows anunencrypted HTTP versioninstead of HTTPS, your connection is unsafe.

If you suspect you have connected to a compromised internet, go through this to reduce the potential consequences.

Don’t panic, mind.

For example, you shouldn’t create a new account, access your bank website, or share files.